Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.034708] ================================================================== [ 18.034783] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 18.034889] Read of size 1 at addr fff00000c63d6773 by task kunit_try_catch/196 [ 18.034942] [ 18.034971] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.035072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.035119] Hardware name: linux,dummy-virt (DT) [ 18.035167] Call trace: [ 18.035217] show_stack+0x20/0x38 (C) [ 18.035266] dump_stack_lvl+0x8c/0xd0 [ 18.035314] print_report+0x118/0x608 [ 18.035371] kasan_report+0xdc/0x128 [ 18.035507] __asan_report_load1_noabort+0x20/0x30 [ 18.035593] ksize_unpoisons_memory+0x628/0x740 [ 18.035680] kunit_try_run_case+0x170/0x3f0 [ 18.035745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.035818] kthread+0x328/0x630 [ 18.035886] ret_from_fork+0x10/0x20 [ 18.035951] [ 18.035989] Allocated by task 196: [ 18.036055] kasan_save_stack+0x3c/0x68 [ 18.036122] kasan_save_track+0x20/0x40 [ 18.036178] kasan_save_alloc_info+0x40/0x58 [ 18.036243] __kasan_kmalloc+0xd4/0xd8 [ 18.036329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.036431] ksize_unpoisons_memory+0xc0/0x740 [ 18.036471] kunit_try_run_case+0x170/0x3f0 [ 18.036511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.036555] kthread+0x328/0x630 [ 18.036591] ret_from_fork+0x10/0x20 [ 18.036627] [ 18.036645] The buggy address belongs to the object at fff00000c63d6700 [ 18.036645] which belongs to the cache kmalloc-128 of size 128 [ 18.036704] The buggy address is located 0 bytes to the right of [ 18.036704] allocated 115-byte region [fff00000c63d6700, fff00000c63d6773) [ 18.036896] [ 18.036958] The buggy address belongs to the physical page: [ 18.037007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.037108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.037156] page_type: f5(slab) [ 18.037454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.037532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.037631] page dumped because: kasan: bad access detected [ 18.037734] [ 18.037796] Memory state around the buggy address: [ 18.037849] fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.037910] fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.037970] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.038075] ^ [ 18.038134] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.038187] fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.038226] ================================================================== [ 18.038864] ================================================================== [ 18.038914] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 18.038989] Read of size 1 at addr fff00000c63d6778 by task kunit_try_catch/196 [ 18.039057] [ 18.039095] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.039199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.039247] Hardware name: linux,dummy-virt (DT) [ 18.039295] Call trace: [ 18.039353] show_stack+0x20/0x38 (C) [ 18.039430] dump_stack_lvl+0x8c/0xd0 [ 18.039496] print_report+0x118/0x608 [ 18.039541] kasan_report+0xdc/0x128 [ 18.039626] __asan_report_load1_noabort+0x20/0x30 [ 18.039677] ksize_unpoisons_memory+0x618/0x740 [ 18.039745] kunit_try_run_case+0x170/0x3f0 [ 18.039987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.040051] kthread+0x328/0x630 [ 18.040096] ret_from_fork+0x10/0x20 [ 18.040234] [ 18.040270] Allocated by task 196: [ 18.040320] kasan_save_stack+0x3c/0x68 [ 18.040405] kasan_save_track+0x20/0x40 [ 18.040481] kasan_save_alloc_info+0x40/0x58 [ 18.040588] __kasan_kmalloc+0xd4/0xd8 [ 18.040646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.040775] ksize_unpoisons_memory+0xc0/0x740 [ 18.040863] kunit_try_run_case+0x170/0x3f0 [ 18.040975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.041028] kthread+0x328/0x630 [ 18.041063] ret_from_fork+0x10/0x20 [ 18.041099] [ 18.041119] The buggy address belongs to the object at fff00000c63d6700 [ 18.041119] which belongs to the cache kmalloc-128 of size 128 [ 18.041175] The buggy address is located 5 bytes to the right of [ 18.041175] allocated 115-byte region [fff00000c63d6700, fff00000c63d6773) [ 18.041239] [ 18.041259] The buggy address belongs to the physical page: [ 18.041329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.041392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.041440] page_type: f5(slab) [ 18.041567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.041652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.041711] page dumped because: kasan: bad access detected [ 18.041803] [ 18.041907] Memory state around the buggy address: [ 18.041975] fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.042040] fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042139] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.042225] ^ [ 18.042308] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042436] fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.042484] ================================================================== [ 18.043653] ================================================================== [ 18.043731] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 18.043782] Read of size 1 at addr fff00000c63d677f by task kunit_try_catch/196 [ 18.043852] [ 18.043901] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT [ 18.044008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.044056] Hardware name: linux,dummy-virt (DT) [ 18.044101] Call trace: [ 18.044141] show_stack+0x20/0x38 (C) [ 18.044207] dump_stack_lvl+0x8c/0xd0 [ 18.044256] print_report+0x118/0x608 [ 18.044364] kasan_report+0xdc/0x128 [ 18.044440] __asan_report_load1_noabort+0x20/0x30 [ 18.044517] ksize_unpoisons_memory+0x690/0x740 [ 18.044567] kunit_try_run_case+0x170/0x3f0 [ 18.044615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.044670] kthread+0x328/0x630 [ 18.044714] ret_from_fork+0x10/0x20 [ 18.044760] [ 18.044777] Allocated by task 196: [ 18.044805] kasan_save_stack+0x3c/0x68 [ 18.044844] kasan_save_track+0x20/0x40 [ 18.045004] kasan_save_alloc_info+0x40/0x58 [ 18.045075] __kasan_kmalloc+0xd4/0xd8 [ 18.045180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.045248] ksize_unpoisons_memory+0xc0/0x740 [ 18.045331] kunit_try_run_case+0x170/0x3f0 [ 18.045434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.045520] kthread+0x328/0x630 [ 18.045633] ret_from_fork+0x10/0x20 [ 18.045701] [ 18.045774] The buggy address belongs to the object at fff00000c63d6700 [ 18.045774] which belongs to the cache kmalloc-128 of size 128 [ 18.045893] The buggy address is located 12 bytes to the right of [ 18.045893] allocated 115-byte region [fff00000c63d6700, fff00000c63d6773) [ 18.045997] [ 18.046016] The buggy address belongs to the physical page: [ 18.046045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6 [ 18.046283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.046417] page_type: f5(slab) [ 18.046496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.046603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.046688] page dumped because: kasan: bad access detected [ 18.046747] [ 18.046792] Memory state around the buggy address: [ 18.046908] fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.046972] fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047014] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.047102] ^ [ 18.047170] fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047254] fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047370] ==================================================================
[ 11.756513] ================================================================== [ 11.756951] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.757718] Read of size 1 at addr ffff8881035ebf7f by task kunit_try_catch/214 [ 11.758093] [ 11.758210] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.758254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.758266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.758288] Call Trace: [ 11.758304] <TASK> [ 11.758319] dump_stack_lvl+0x73/0xb0 [ 11.758346] print_report+0xd1/0x650 [ 11.758370] ? __virt_addr_valid+0x1db/0x2d0 [ 11.758392] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.758412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.758435] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.758455] kasan_report+0x141/0x180 [ 11.758478] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.758504] __asan_report_load1_noabort+0x18/0x20 [ 11.758535] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.758556] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.758576] ? finish_task_switch.isra.0+0x153/0x700 [ 11.758600] ? __switch_to+0x5d9/0xf60 [ 11.758621] ? dequeue_task_fair+0x156/0x4e0 [ 11.758645] ? __schedule+0x10cc/0x2b60 [ 11.758669] ? __pfx_read_tsc+0x10/0x10 [ 11.758690] ? ktime_get_ts64+0x86/0x230 [ 11.758715] kunit_try_run_case+0x1a5/0x480 [ 11.758736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.758755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.758779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.758804] ? __kthread_parkme+0x82/0x180 [ 11.758825] ? preempt_count_sub+0x50/0x80 [ 11.758935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.758960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.758983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.759007] kthread+0x337/0x6f0 [ 11.759025] ? trace_preempt_on+0x20/0xc0 [ 11.759048] ? __pfx_kthread+0x10/0x10 [ 11.759067] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.759089] ? calculate_sigpending+0x7b/0xa0 [ 11.759111] ? __pfx_kthread+0x10/0x10 [ 11.759130] ret_from_fork+0x41/0x80 [ 11.759152] ? __pfx_kthread+0x10/0x10 [ 11.759170] ret_from_fork_asm+0x1a/0x30 [ 11.759200] </TASK> [ 11.759212] [ 11.767454] Allocated by task 214: [ 11.767646] kasan_save_stack+0x45/0x70 [ 11.767908] kasan_save_track+0x18/0x40 [ 11.768092] kasan_save_alloc_info+0x3b/0x50 [ 11.768241] __kasan_kmalloc+0xb7/0xc0 [ 11.768436] __kmalloc_cache_noprof+0x189/0x420 [ 11.768657] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.768952] kunit_try_run_case+0x1a5/0x480 [ 11.769110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.769367] kthread+0x337/0x6f0 [ 11.769499] ret_from_fork+0x41/0x80 [ 11.769632] ret_from_fork_asm+0x1a/0x30 [ 11.769772] [ 11.769846] The buggy address belongs to the object at ffff8881035ebf00 [ 11.769846] which belongs to the cache kmalloc-128 of size 128 [ 11.770401] The buggy address is located 12 bytes to the right of [ 11.770401] allocated 115-byte region [ffff8881035ebf00, ffff8881035ebf73) [ 11.771049] [ 11.771127] The buggy address belongs to the physical page: [ 11.771299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb [ 11.771791] flags: 0x200000000000000(node=0|zone=2) [ 11.772224] page_type: f5(slab) [ 11.772412] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.772812] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.773188] page dumped because: kasan: bad access detected [ 11.773364] [ 11.773435] Memory state around the buggy address: [ 11.773659] ffff8881035ebe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.773999] ffff8881035ebe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.774497] >ffff8881035ebf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.774768] ^ [ 11.774996] ffff8881035ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.775403] ffff8881035ec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.775794] ================================================================== [ 11.731518] ================================================================== [ 11.731844] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.732360] Read of size 1 at addr ffff8881035ebf78 by task kunit_try_catch/214 [ 11.732825] [ 11.732929] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.732974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.732986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.733021] Call Trace: [ 11.733038] <TASK> [ 11.733052] dump_stack_lvl+0x73/0xb0 [ 11.733077] print_report+0xd1/0x650 [ 11.733281] ? __virt_addr_valid+0x1db/0x2d0 [ 11.733359] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.733379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.733402] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.733422] kasan_report+0x141/0x180 [ 11.733446] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.733471] __asan_report_load1_noabort+0x18/0x20 [ 11.733492] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.733523] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.733543] ? finish_task_switch.isra.0+0x153/0x700 [ 11.733567] ? __switch_to+0x5d9/0xf60 [ 11.733589] ? dequeue_task_fair+0x156/0x4e0 [ 11.733613] ? __schedule+0x10cc/0x2b60 [ 11.733637] ? __pfx_read_tsc+0x10/0x10 [ 11.733657] ? ktime_get_ts64+0x86/0x230 [ 11.733682] kunit_try_run_case+0x1a5/0x480 [ 11.733704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.733723] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.733748] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.733772] ? __kthread_parkme+0x82/0x180 [ 11.733794] ? preempt_count_sub+0x50/0x80 [ 11.733818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.733854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.733889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.733913] kthread+0x337/0x6f0 [ 11.733930] ? trace_preempt_on+0x20/0xc0 [ 11.733954] ? __pfx_kthread+0x10/0x10 [ 11.733973] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.733995] ? calculate_sigpending+0x7b/0xa0 [ 11.734017] ? __pfx_kthread+0x10/0x10 [ 11.734036] ret_from_fork+0x41/0x80 [ 11.734057] ? __pfx_kthread+0x10/0x10 [ 11.734076] ret_from_fork_asm+0x1a/0x30 [ 11.734106] </TASK> [ 11.734117] [ 11.745005] Allocated by task 214: [ 11.745205] kasan_save_stack+0x45/0x70 [ 11.745386] kasan_save_track+0x18/0x40 [ 11.745925] kasan_save_alloc_info+0x3b/0x50 [ 11.746226] __kasan_kmalloc+0xb7/0xc0 [ 11.746398] __kmalloc_cache_noprof+0x189/0x420 [ 11.746740] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.747041] kunit_try_run_case+0x1a5/0x480 [ 11.747210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.747462] kthread+0x337/0x6f0 [ 11.747891] ret_from_fork+0x41/0x80 [ 11.748091] ret_from_fork_asm+0x1a/0x30 [ 11.748275] [ 11.748502] The buggy address belongs to the object at ffff8881035ebf00 [ 11.748502] which belongs to the cache kmalloc-128 of size 128 [ 11.749286] The buggy address is located 5 bytes to the right of [ 11.749286] allocated 115-byte region [ffff8881035ebf00, ffff8881035ebf73) [ 11.750197] [ 11.750308] The buggy address belongs to the physical page: [ 11.750697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb [ 11.751223] flags: 0x200000000000000(node=0|zone=2) [ 11.751447] page_type: f5(slab) [ 11.751751] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.752164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.752475] page dumped because: kasan: bad access detected [ 11.752856] [ 11.752987] Memory state around the buggy address: [ 11.753381] ffff8881035ebe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.753750] ffff8881035ebe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.754351] >ffff8881035ebf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.754750] ^ [ 11.755175] ffff8881035ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.755432] ffff8881035ec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.756034] ================================================================== [ 11.706484] ================================================================== [ 11.707118] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.707636] Read of size 1 at addr ffff8881035ebf73 by task kunit_try_catch/214 [ 11.708480] [ 11.708620] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 11.708667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.708679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.708700] Call Trace: [ 11.708713] <TASK> [ 11.708729] dump_stack_lvl+0x73/0xb0 [ 11.708758] print_report+0xd1/0x650 [ 11.708783] ? __virt_addr_valid+0x1db/0x2d0 [ 11.708807] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.708828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.709027] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.709054] kasan_report+0x141/0x180 [ 11.709078] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.709104] __asan_report_load1_noabort+0x18/0x20 [ 11.709125] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.709146] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.709165] ? finish_task_switch.isra.0+0x153/0x700 [ 11.709190] ? __switch_to+0x5d9/0xf60 [ 11.709212] ? dequeue_task_fair+0x156/0x4e0 [ 11.709237] ? __schedule+0x10cc/0x2b60 [ 11.709261] ? __pfx_read_tsc+0x10/0x10 [ 11.709281] ? ktime_get_ts64+0x86/0x230 [ 11.709307] kunit_try_run_case+0x1a5/0x480 [ 11.709330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.709349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.709374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.709398] ? __kthread_parkme+0x82/0x180 [ 11.709420] ? preempt_count_sub+0x50/0x80 [ 11.709445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.709465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.709489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.709513] kthread+0x337/0x6f0 [ 11.709530] ? trace_preempt_on+0x20/0xc0 [ 11.709554] ? __pfx_kthread+0x10/0x10 [ 11.709573] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.709595] ? calculate_sigpending+0x7b/0xa0 [ 11.709616] ? __pfx_kthread+0x10/0x10 [ 11.709635] ret_from_fork+0x41/0x80 [ 11.709657] ? __pfx_kthread+0x10/0x10 [ 11.709675] ret_from_fork_asm+0x1a/0x30 [ 11.709705] </TASK> [ 11.709717] [ 11.720614] Allocated by task 214: [ 11.721030] kasan_save_stack+0x45/0x70 [ 11.721308] kasan_save_track+0x18/0x40 [ 11.721503] kasan_save_alloc_info+0x3b/0x50 [ 11.721694] __kasan_kmalloc+0xb7/0xc0 [ 11.722114] __kmalloc_cache_noprof+0x189/0x420 [ 11.722316] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.722524] kunit_try_run_case+0x1a5/0x480 [ 11.722829] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.723239] kthread+0x337/0x6f0 [ 11.723374] ret_from_fork+0x41/0x80 [ 11.723613] ret_from_fork_asm+0x1a/0x30 [ 11.724045] [ 11.724155] The buggy address belongs to the object at ffff8881035ebf00 [ 11.724155] which belongs to the cache kmalloc-128 of size 128 [ 11.724633] The buggy address is located 0 bytes to the right of [ 11.724633] allocated 115-byte region [ffff8881035ebf00, ffff8881035ebf73) [ 11.725455] [ 11.725623] The buggy address belongs to the physical page: [ 11.725871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb [ 11.726238] flags: 0x200000000000000(node=0|zone=2) [ 11.726463] page_type: f5(slab) [ 11.726625] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.726960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.727277] page dumped because: kasan: bad access detected [ 11.727515] [ 11.728226] Memory state around the buggy address: [ 11.728445] ffff8881035ebe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.729005] ffff8881035ebe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.729330] >ffff8881035ebf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.729697] ^ [ 11.730116] ffff8881035ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.730473] ffff8881035ec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.730930] ==================================================================